APPLYING ACTION RESEARCH IN THE ADOPTION OF INFORMATION SYSTEMS SECURITY POLICIES

Size: px
Start display at page:

Download "APPLYING ACTION RESEARCH IN THE ADOPTION OF INFORMATION SYSTEMS SECURITY POLICIES"

Transcription

1 APPLYING ACTION RESEARCH IN THE ADOPTION OF INFORMATION SYSTEMS SECURITY POLICIES Isabel Lopes¹ and Filipe de Sá-Soares² ¹Departamento de Informática e Comunicações, Instituto Politécnico de Bragança, Bragança, Portugal ²Centro Algoritmi, Universidade do Minho, Guimarães, Portugal isalopes@ipb.pt fss@dsi.uminho.pt Abstract Information Systems Security (ISS) is a critical issue for a wide range of organizations. This paper focuses on organizations belonging to a particular sector, namely Local Public Administration, where public and personal information must be protected by those in charge, and where there must be a concern to view security as a priority. There are several measures which can be implemented in order to ensure the effective protection of information assets, among which stands out the adoption of ISS policies. A recent census concluded that among the 308 Town Councils in Portugal, only 38 indicated to have an ISS policy. The conclusion drawn from that study was that the adoption of ISS policies has not become a reality yet. As an attempt to mitigate this fact, an academic-practitioner collaboration effort was established regarding the implementation of ISS policies in three Town Councils. These interventions were conceived as Action Research projects. This article aims to constitute an empirical study on the applicability of the Action Research method in information systems, more specifically through the implementation of an ISS policy in Town Councils where previous attempts to adopt a policy have failed. The research question we intend to answer is to what extent this research method is adequate to reach the proposed goal. The results of the study suggest that Action Research is a promising means for the institutionalization of ISS policies adoption. It can both act as a research method, improving the understanding among researchers about the issues that hinder such adoption, and as a change method, assisting practitioners to overcome barriers that have prevented the implementation of ISS policies. Keywords: Action Research, Information Systems Security Policies, Information Systems Security Policy Adoption, Information Security 1. Adoption of Information Systems Security Policies Nowadays, Information Systems Security (ISS) is a critical issue for a wide range of organizations. The centrality of information in the operations and management of organizations raises concerns regarding the protection of information systems (IS) assets, including hardware, software, data, processes, and people. In order to ensure the effective protection of IS, organizations implement several different security measures. Among these measures, ISS policies stand out. These are documents which guide or regulate people or systems actions in the domain of information systems security (de Sá-Soares 2005, p. 56). The importance of ISS policies is stressed by several authors, such as Peltier (2002, p. 21), who classifies them as the cornerstone of an effective information security architecture. In order to adopt an ISS policy, an organization must follow a sequence of steps, beginning by writing the policy, followed by its implementation, and then, at predefined moments or when circumstances require it, by reviewing its provisions, which may prompt modifications in the policy. Indeed, this sequence of steps may be viewed as a cycle of formulation implementation revision of the policy. Although there is a considerable agreement in the literature regarding the main role played by ISS policies, there is evidence that organizations often fail in the adoption of this security control. Focusing their attention in a particular type of organizations, namely Local Public Administration, Lopes and de Sá-Soares (2010) surveyed the 308 Town Councils in Portugal to find out that only 38 (12%) indicated to have an ISS policy. However, it was also found that 177 (66%) of the respondents had thought or

2 were considering formulating an ISS policy, but were not yet able to reach the state of having adopted that security measure. The conclusion drawn from the study was that the adoption of ISS policies has not become a reality yet, suggesting there is still a long way to go before the institutionalization of ISS policies measure that group of organizations. This state of affairs promptly raised several questions to the researchers, such as the reasons for such a low level of adoption and the obstacles that have prevented the Town Councils to successfully apply ISS policies. Shortly after the conclusion of that survey, the heads of the IT departments of several municipalities that still hadn t adopted an ISS policy contacted the first author of this paper requesting assistance for the implementation of an ISS policy. Although the specialized literature provided general guidelines regarding the content for the policy documents as well as several recommendations for writing, implementing, and reviewing ISS policies, the authors were faced with a methodological decision, i.e., how to do it. After considering several alternatives, such as promoting workshops or just plain consultation work, a decision was made to propose the Town Councils an Action Research (AR) intervention. This article aims to constitute an empirical study on the applicability of the Action Research method in the field of IS, more specifically analyzing the implementation of ISS policies in Town Councils where previous attempts to adopt a policy had failed, according to the tenets advocated by AR. Hence, the research question that guided this work was to answer to what extent AR methodology is adequate to support the process leading to the adoption of ISS policies. Structurally, this paper is organized as follows. After this contextualization of the subject, we review the main tenets and characteristics of AR, in general and in the field of IS. Then, we describe the collaborative efforts that were promoted to adopt ISS policies in three Town Councils, followed by a discussion. Finally, we enumerate the papers main contribution, limitations, and suggestions for future work. 2. Perspectives on Action Research The description of a research method application, as well as the lessons learned from that application, benefit from several previous clarifications. Among them are the way researchers understand the research method, the indication of the method s main characteristics, and the explanation of how the method applies to the targeted practice context. AR method can be viewed in various ways, and there are probably as many views of it as the number of authors who address the topic (Jӧnsson 1991). As an example, for Rapoport (1970, p. 499), AR aims to contribute both to the practical concerns of people in an immediate problematic situation and to the goals of social science by joint collaboration within a mutually acceptable ethical framework. Kemmis and McTaggart (1988, p. 125) see AR as a kind of collective and self-reflective survey which the participants in social situations use for the rationality and justice of their own educational actions and for their understanding of those actions as well as the situations in which they undertake them. Although different authors may have different perspectives concerning the application of AR, there is consensus with respect to the method general architecture. Briefly, AR starts with the detection of a problem, from which changes are projected in order to solve the problem. This process has a cyclic nature and, once it is applied to organizations or other social groups, it will hardly be seen as definitely solved. It will rather suffer changes and require new interventions. As a result, AR is considered a change-oriented methodological approach: it is not restricted simply to the understanding of phenomena but it deliberately aims at changing those phenomena. Although the exact characterization of AR varies with the authors, Dick (2000) isolated a set of aspects which seem to be consensual among authors: It acts on an existing situation with the dual aim of improving it and expanding the knowledge on the subject. It possesses a cyclic nature: a number of steps are performed repeatedly. The cycle varies with the author but, at least, it includes the steps: Planning Action Reflection. It admits the participation of the research subjects, although this condition is not unanimously considered as mandatory. It possesses a reflexive nature: a critical reflection on the research process itself as well as on the results obtained is an important part of each cycle. It is predominantly qualitative, although quantifications are possible in some situations.

3 The AR method completes an interactive cycle made up of a series of stages whose number and designation depend on the author. Considering the review of literature carried out, three illustrative models were identified, varying in terms of structural complexity. Cunha and Figueiredo (2002) present a model adapted from Dick (1992), that includes three stages: Planning, Action and Reflection, as shown in Figure 1. Planning Reflection Action Figure 1: Three steps AR cycle Source: Cunha and Figueiredo (2002) Based on these three building blocks, those authors point out the philosophy underlying AR: An intervention is planned (Planning); the corresponding action is taken (Action), causing a change which will hopefully lead to development; finally, a critical analysis of the results is made, which should lead to a better knowledge of the situation, which, in turn, enables possible adjustments that lead to new cycles (Reflection). Tripp (2005) conceives the execution of AR in four phases: Planning, Acting, Describing, and Evaluating, as represented in Figure 2. In AR a change is planned, described and evaluated viewing the improvement of an action. Throughout the process, further learning takes place, both concerning the action and the research itself. Action Acting to implement the planned improvement Planning the improvement of an action Monitoring and describing the effects of the action Evaluating the results of the action Research Figure 2: Four steps AR cycle Source: Tripp (2005) A more complex model was proposed by Susman and Evered (1978), who claim that the approach initially requires the definition of a Client-System infrastructure, that is to say, a research environment, followed by a cycle made up of five stages, as shown in Figure 3. Associated with each of the stages included in this model are the following goals: Diagnosing Identification of a problematic situation, related to the need of change of a certain organization; Action Planning Specification of the organizational actions which must be undertaken in order to solve the problems identified in the diagnostic; Action Taking Implementation of the actions previously planned which will supposedly lead to changes; Evaluating Assessment of the intended goals achievement and solution;

4 Specifying Learning Specification of the knowledge acquired with the introduced change. Although this stage appears as the last in the scheme, it consists of a permanent process. Diagnosing Specifying Learning Client-System infrastructure Action Planning Evaluating Action Taking Figure 3: Five steps AR cycle Source: Susman and Evered (1978) 3. Action Research Applied to Information Systems In IS the nature of knowledge is different from the nature of knowledge in traditional Sciences (empirical and formal). For this reason, traditional research methods are not always appropriate to guide the inquiry in the field of IS. Actually, some authors classify the traditional approaches as impracticable in IS, for not being realistic (Cunha and Figueiredo 2002). This understanding may lead to the option for qualitative research methods to study IS related phenomena. One of the main reasons given to justify the use of such methods is the fact that IS include the human element as a variable or consider it as a determinant research factor. Here probably lies one of the reasons for using AR in IS studies, as it is one of the few research approaches that we can legitimately apply to study the effects of specific changes in the methods of systems development in human organizations (Baskerville and Wood-Harper 1996). According to Baskerville (1999), AR was explicitly introduced in the IS community as a pure research method by Wood-Harper (1985). Reviewing the uses of AR in IS, Baskerville and Wood-Harper (1998) were able to identify ten forms of AR in IS, differing in terms of several characteristics, which were organized into four groups: Process model; Structure; Typical involvement; and Primary goals. Table 1 shows these forms and characteristics. Table 1: IS Action Research Forms and Characteristics Adapted from Baskerville and Wood-Harper (1998) Forms of IS Action Research Characteristics of IS Action Research Canonical AR IS Prototyping Soft Systems Methodology ETHICS Multiview Action Science Participant Observation Action Learning Clinical Field Work Process Consultation Process model Iterative Reflective Linear Structure Rigorous Fluid Typical involvement Collaborative Facilitative Experiment Primary goals Organizational development System design Scientific knowledge Training

5 From the exposed structures on works carried out in the field of IS using AR, we can see the variety of practices intervened, as well as the different types these interventions have assumed from the methodological point of view. In the context of qualitative research in IS, Estay and Pastor (2000) consider AR operates over two realities, a scientific/academic one and a practical one. Thus, two different main types of AR cycles can be identified: Cycles looking to solve problems in IS projects: These projects frequently consist of developing an IT artifact, with the researcher focusing on the solution of specific IS development problems. In this case, the purpose of AR is the creation of knowledge useful to the subjects and the improvement of a certain practice in which they are involved. The method is applied to build models, theories and knowledge, but in a way that is informed and biased by the reality upon which it is intended to act. In this cycle, the interest in solving a specific problem generates interest in researching the practice associated with that problem. Cycles looking to inquiry in research projects: These projects are intentional research efforts in search of a result, in which AR acts as a structuring working method and as a reason for approaching a certain reality with the aim of testing a theory or hypothesis. In this case, the primary intention is to produce new knowledge in the field of IS, enabling the improvement of the researchers themselves. In this cycle, the interest in researching generates the interest in solving specific problems. 4. Action Research Applied to the Adoption of Information Systems Security Policies The option for AR as the fundamental methodological guidance for the ISS policy adoption process resulted from the assumption of a set of propositions, partly supported in the literature and partly stemming from the results of the survey previously mentioned. Given the reported difficulties of formulating a policy, as well as the evidence regarding the resistance of users on observing the policy, a joint, collaborative effort was the preferred way to move forward. By involving researchers and practitioners in a dialogue, we hoped to be able to transfer some best practices and theoretical knowledge to the users, while users explained the context factors that may facilitate or inhibit the success of the ISS policy and elaborate on their specific requirements in terms of IS protection. It was also hoped that the cyclical structure of AR could better capture the advocated steps for the adoption of ISS policies, from formulation, to implementation, and then to revision. It would be easy to make that sequence of steps as a natural progression, wherein after its culmination, a new cycle of formulation, implementation and revision of ISS policies could be triggered. Underlying this cycle would be a learning process, where users and researchers could enhance the chances of learning what was working as expected, and what fell short or was counterproductive. As the cycle of AR starts with the detection of a problem, the perception of such problem was clear in this study, namely the low level of ISS policies adoption by Portuguese City Councils. After detecting this problem, intervention projects were started in three City Councils, aiming the introduction of changes towards the adoption of ISS policies. The whole process was structured according to the model proposed by Susman and Evered (1978) (cf. Figure 3). In the first stage Diagnosing a problematic situation was identified, namely the non-adoption of an ISS policy by the City Council. This situation was made worse by the fact that the problem had been isolated previously and the head of the IT department had not been able to invert that situation. In other words, although the problem was known and assumed, the organizations had not been able to create the context to change the situation. This finding reinforced the conviction that AR might prove to be particularly appropriate to change the ongoing practice. The first author came into contact with the reality of the three City Councils, starting her intervention by meeting the head of the IT department, and immediately trying to identify the reasons for not having managed to implement an ISS policy previously. In one of the cases, the main reason was that they had not found any ISS policy model that they could adapt to the City Council reality. In another case, there had been some resistance from a council executive regarding the adoption of an ISS policy. In the third case, it was due to the fact that

6 the ISS policy document had been made available on the Council intranet by the IS function, without being approved by the executive and therefore, the implementation consisted only on making the document available online without any other type of contract with the users of the City Council IS. Besides the identification of the problem and the reasons inherent to the previous adoption failures, it was also during this stage that the real need for an ISS policy in the City Council was assessed. It was consensual that City Councils must stop worrying only about crackers attacks or about the implementation of firewalls or anti-virus, and start focusing on the creation of an ISS policy which can promote not only the confidentiality, integrity, and availability of information, but also the responsibility, integrity, trust, and ethics towards information. In the second stage Action Planning the organizational actions which must be executed to solve the problems identified in the diagnostic were specified. This process started by drawing the ISS policy document. The first author and the City Council IT Department Head started by assessing whether one policy would be enough or more than one would have to be drawn. We studied the possibility of drawing two policies, one aimed at the IT technicians and another at the users. However, bearing in mind that technicians are also users, although with different specifications, we chose to write only one broader policy document. We planned to draw the policy based on a model proposed by the first author and adapted to each City Council following the indications of elements from the IT department. After drawing the security policy, we planned its implementation, which depended directly on the guidelines addressed in it. After talking to the City Council entities, two essential factors were isolated for the success of policy implementation. Firstly, the policy would need the approval of higher entities in order to have the necessary authority recognized by all the users. Besides this, its right promotion would be necessary among the organization human resources and users of the addressed IS in general. The way to promote the policy was also taken into account, and we planned that, after its approval, it would be clearly explained to the heads of all departments and heads of all divisions so that these could deliver and explain the document to all IS users in their sections. In the third stage Action Taking the planned actions were implemented, in the hope that these would lead to a change in the organization. In the face of the risk that ISS policies may not respond to the ISS requirements of an organization if they become obsolete due to changes in the business or threats to which the organization is submitted, some factors, such as auditing, were included in the implementation stage, in order to allow an assessment of the conformity with what was defined in the policy. The implementation also considered the management of incidents which, besides treating ISS incidents, enables to verify whether the policy manages to respond to the incidents or on the contrary, it does not include some important aspect, thus resulting in the need to implement the policy again or review its formulation. Depending on the importance or severity of the incidents or unconformities detected, relevant elements would be available for an eventual reformulation. To a certain degree, it is possible to draw a parallel between the integration of these audit and incident management tools and the subsequent sages of AR, as they enable an easier evaluation of the implemented actions, and might be useful to launch new AR cycles viewing the practical improvement of the implemented ISS policies. In the fourth stage Evaluating we assessed the achievement of the intended goals of the ISS policy implementation. This evaluation required a review of the policy, which must take place periodically and especially whenever significant changes occur, in order to guarantee that the policy continues to meet the goals for which it was adopted. The evaluation was carried out by assessing the users compliance with the rules set by the policy. The subsequent modification of the policy was not found necessary for the time being. The last stage Specifying Learning concludes the cycle, although in fact, this stage accompanies the whole process cycle of AR. The learning which took place throughout the whole cycle worked as a starting point to a new planning and, therefore, to the beginning of a new cycle sequence. 5. Discussion The implementation of an ISS policy following the AR method was aimed at the construction of a solution to generate new knowledge, which was useful to the participants, on how to implement an ISS policy and improve its practice through successive evaluations and associated changes when necessary. At the same time that researchers cooperate in that process, they also aimed to add to accumulated knowledge, trying to understand the hindrances faced by organizations in the process of ISS policy adoption and to investigate the effectiveness of initiatives put on practice to overcome

7 those difficulties. By participating in several of those processes, the research team collected evidence that may prove useful on projecting future interventions in other organizations of the same type. This dual interest of researchers helping to change the specific context of practice (Action) and adding to the general knowledge of the ISS policy adoption process (Research) raises some questions. Since the intervention is based on a cooperative structure, and since the control of the intervention by researchers is limited, the clear articulation and negotiation of the goals, views, and interests of the two groups of participants is particularly relevant. In the present application of AR, these aspects were born in mind so as to guarantee higher accuracy and validity as well as lower limitations concerning the conclusions obtained in general. There was an effort to not manipulate or control, but to present users with alternative solutions, to draw their attention to issues that may go unnoticed or that although problematic for the users, should be addressed. Similarly, particular attention was devoted to the situational factors that characterize the context of practice, both in terms of work routines and of security actions that users have to counterbalance. Given the collaborative nature of this study, the insights of the participating researcher were often debated and brought to reflection in order to produce a shared understanding that led to the change. Indeed, it was not intended that the researcher would unilaterally propose a change plan, but to build such a plan with the other actors involved in the transformation, namely the Town Council IT Departments. The organizational culture of the Town Council and the level of training of its IT Department technicians play an important role in the implementation of an ISS policy, both in terms of awareness and training sessions required and in terms of users resistance to the provisions of the policy. Also, the size of the Town Council dictated how the policy document was disseminated among IS users. The most critical aspect in the adoption of an ISS policy by a Town Council is the ISS awareness level of its executives. This is a paramount factor for explaining delays or blockages in the adoption, as well as processes that lead to a quick adoption of a policy. In all three interventions, the actors believed that having an ISS policy model they could adapt to their reality increased the chances of successfully implementing an ISS policy. Among the cases of application studied, we found evidence that the adoption of ISS measures, namely policies, must go beyond the implementation of hardware or software devices which protect what is stored in the organization databases and files and which, quite often, do not offer the necessary or expected security due to functioning, parameterization or installation flaws (Peltier 2002). Besides the technological component, the human element constitutes the core of ISS. The difficulty in managing that element and in making it the main responsible for an effective protection of information assets is what makes ISS one of the most difficult and arduous aspects of many organizations management. The institutionalization of ISS policies implies that the users observe the provisions of these policies on a daily basis, or, not of less importance, that they identify the aspects of the policy which lead to a lower protection level. By contemplating the specificities of each organization and by promoting the cooperation among researchers and users regarding the projection of actions which will affect them, AR acts both as a research and change method particularly promising for the adoption of ISS policies. On the one hand, it helps researchers understand the usefulness and limitations of the existing knowledge, opening new avenues to a better understanding of the ISS policies adoption phenomenon. On the other hand, and as a change method, it enhances the sense of property and coresponsibility of those who need to put into practice or review the procedures set in the ISS policies on a daily basis. Situating the interventions according to the classification presented in Table 1, the studies configure canonical AR projects, grounded in an iterative process model guided by a rigorous structure, with the participating researcher playing a facilitative role, and having organizational development as their primary goal in the form of adopted ISS policies. 6. Conclusion This study involved three City Councils through direct contact with the correspondent IT departments and indirect contact with the municipal executive as well as the users of the municipality IS. This work reports on the use and appropriateness of AR applied to the adoption of ISS policies, thus contributing as an empirical study on the application of that method in the field of IS.

8 This research work presents limitations, namely with respect to the number of City Councils involved. Although we believe that the study carried out in the three City Councils generated enough data to serve the goal of the work, we also believe that a larger number might result in a more sustained set of data. Nevertheless, we highlight that the application of the action research method requires the researcher s direct involvement, thus requiring a substantial amount of time. Another limitation of this work is related to the delimitation of the study within an organizational sector and a specific national reality. Among the works which might be carried out in the future, we highlight the proposal of an ISS policy model, thought up for the national municipal reality, and which may work as a starting point to the adoption of ISS policies by the City Councils, so as to invert the reduced number of policies existent in the Portuguese City Councils. The provision of that document by the City Councils and the use of AR as a method for planning and promoting change, in which researchers and practitioners project actions, implement them, and evaluate their impacts, may prove to be two important tools for the institutionalization of ISS policies in organizations. Acknowledgments This work is funded by FEDER funds through Programa Operacional Fatores de Competitividade COMPETE and National funds by FCT Fundação para a Ciência e Tecnologia under Project FCOMP FEDER References Baskerville, R. (1999) Investigating Information Systems with Action Research, Communications of the AIS, Vol 2, No. 19, pp Baskerville, R. and Wood-Harper, A.T. (1998) Diversity in Information Systems Action Research Methods, European Journal of Information Systems, Vol 7, No. 2, pp Baskerville, R. and Wood-Harper, A.T (1996) A Critical Perspective on Action Research as a Method for Information Systems Research, Journal of Information Technology, Vol 3, No. 11, pp Cunha, P.R. and Figueiredo, A.D. (2002) Action Research and Critical Rationalism: a Virtuous Marriage, Proceedings of the 10th European Conference on Information Systems, Gdansk, Poland. Dick, B. (2000) A beginner s guide to action research, [online], Southern Cross University, Australia, Dick, B. (1992) Qualitative action research: improving the rigour and economy', Proceedings of the Second World Congress on Action Learning, University of Queensland, Brisbane, Australia. Estay, C. and Pastor, J. (2000) Towards a Project Structure for Action-Research in Information Systems, Proceedings of the 10 th Annual Business and Information Technology Conference, Manchester. Jönsson, S. (1991) Action Research, in Nissen, H.-E., Klein, H. and Hirschheim, R. (Eds) Information Systems Research: Contemporary Approaches & Emergent Traditions, North-Holland, Amsterdam, pp Kemmis, S. and McTaggart, R. (Eds) (1988) The Action Research Planner, Third edition, Deakin University Press, Victoria. Lopes, I. and de Sá-Soares, F. (2010) Information Systems Security Policies: A Survey in Portuguese Public Administration, Proceedings of the IADIS International Conference on Information Systems, Porto. Peltier, T.R. (2002) Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Auerbach Publications, Boca Raton. Rapoport, R.N. (1970) Three Dilemmas in Action Research, Human Relations, Vol 23, No. 4, pp de Sá-Soares, F. (2005). A Theory of Action Interpretation of Information Systems Security, PhD Thesis, University of Minho, Guimarães.

9 Susman, G. and Evered, R. (1978) An Assessment of the Scientific Merits of Action Research, Administrative Science Quarterly, Vol 23, No. 4, pp Tripp, D. (2005) Pesquisa-ação: uma introdução metodológica, Educação e Pesquisa, Vol 31, No. 3, pp Wood-Harper, T. (1985) Research Methods in Information Systems: Using Action Research, in Mumford, E., Hirschheim, R., Fitzgerald, G. and Wood-Harper, T. (Eds) Research Methods in Information Systems, North-Holland, Amsterdam, pp

Lessons Learned from the Teaching of IS Development

Lessons Learned from the Teaching of IS Development Journal of Information Technology Education Volume 1 No. 2, 2002 Lessons Learned from the Teaching of IS Development Filomena Lopes and Paula Morais Universidade Portucalense, Porto, Portugal flopes@upt.pt

More information

2 Computer Science and Information Systems Research Projects

2 Computer Science and Information Systems Research Projects 2 Computer Science and Information Systems Research Projects This book outlines a general process for carrying out thesis projects, and it embraces the following components as fundamentally important:

More information

Videogaming and the development of the scientific mind

Videogaming and the development of the scientific mind Report of the Workshop Gaming and the scientific mind- Designing games to develop the scientific mind BtSM 2009 Cairo Designed and held by Carlo Fabricatore, Ph. D. (carlo.fabricatore@initium-studios.com)

More information

1. RATIONALE AND BACKGROUND

1. RATIONALE AND BACKGROUND Collaboration on teamwork projects across borders J. Whatley Module tutor, Information Systems Institute, J.E.Whatley@salford.ac.uk, Ext 55175 F. Bell Independent evaluator, Information Systems Institute,

More information

School of Advanced Studies Doctor Of Management In Organizational Leadership. DM 004 Requirements

School of Advanced Studies Doctor Of Management In Organizational Leadership. DM 004 Requirements School of Advanced Studies Doctor Of Management In Organizational Leadership The mission of the Doctor of Management in Organizational Leadership degree program is to develop the critical and creative

More information

School of Advanced Studies Doctor Of Management In Organizational Leadership/information Systems And Technology. DM/IST 004 Requirements

School of Advanced Studies Doctor Of Management In Organizational Leadership/information Systems And Technology. DM/IST 004 Requirements School of Advanced Studies Doctor Of Management In Organizational Leadership/information Systems And Technology The mission of the Information Systems and Technology specialization of the Doctor of Management

More information

Strategies and Methods for Supplier Selections - Strategic Sourcing of Software at Ericsson Mobile Platforms

Strategies and Methods for Supplier Selections - Strategic Sourcing of Software at Ericsson Mobile Platforms Strategies and Methods for Supplier Selections - Strategic Sourcing of Software at Ericsson Mobile Platforms Caroline Raning & Johanna Vallhagen February 2007 Department of Industrial Management and Logistics,

More information

Guidelines for developing the HDR thesis proposal

Guidelines for developing the HDR thesis proposal Guidelines for developing the HDR thesis proposal Overview All early childhood HDR candidates are required to deliver a research proposal during the first year of enrolment. It is expected that the thesis

More information

Školská sociálna práca 191

Školská sociálna práca 191 190 SUMMARY I n the context of current social changes, social work is faced with various challenges related to the consequences of modernization for the socialization of children. The emergence of new

More information

7 Conclusions and suggestions for further research

7 Conclusions and suggestions for further research 7 Conclusions and suggestions for further research This research has devised an approach to analyzing system-level coordination from the point of view of product architecture. The analysis was conducted

More information

http://hdl.handle.net/10536/dro/du:30006141

http://hdl.handle.net/10536/dro/du:30006141 This is the published version Warren, Matthew and Leitch, Shona 2006, A participational security method for healthcare organisations, in e-society 2006 : Proceedings of the IADIS International Conference

More information

Partnering for Project Success: Project Manager and Business Analyst Collaboration

Partnering for Project Success: Project Manager and Business Analyst Collaboration Partnering for Project Success: Project Manager and Business Analyst Collaboration By Barbara Carkenord, CBAP, Chris Cartwright, PMP, Robin Grace, CBAP, Larry Goldsmith, PMP, Elizabeth Larson, PMP, CBAP,

More information

CFSD 21 ST CENTURY SKILL RUBRIC CRITICAL & CREATIVE THINKING

CFSD 21 ST CENTURY SKILL RUBRIC CRITICAL & CREATIVE THINKING Critical and creative thinking (higher order thinking) refer to a set of cognitive skills or strategies that increases the probability of a desired outcome. In an information- rich society, the quality

More information

Checklist for Operational Risk Management

Checklist for Operational Risk Management Checklist for Operational Risk Management I. Development and Establishment of Comprehensive Operational Risk Management System by Management Checkpoints - Operational risk is the risk of loss resulting

More information

CULTURE PROGRAMME (2007-2013) Guidance Notes for Experts. Strand 1.3.5

CULTURE PROGRAMME (2007-2013) Guidance Notes for Experts. Strand 1.3.5 Education, Audiovisual and Culture Executive Agency Culture CULTURE PROGRAMME (2007-2013) Guidance Notes for Experts Strand 1.3.5 Version January 2012 Education, Audiovisual & Culture Executive Agency

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches

Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches Chinese Business Review, ISSN 1537-1506 December 2011, Vol. 10, No. 12, 1106-1110 D DAVID PUBLISHING Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches Stroie Elena

More information

Single and Multiple-Case Study Designs IS493

Single and Multiple-Case Study Designs IS493 1 2 Research Strategies Basic oppositions Survey research versus Case study quantitative versus qualitative The whole gamut Experiment Survey Archival analysis Historical research Case study 3 Basic Conditions

More information

The European psychologist in forensic work and as expert witness

The European psychologist in forensic work and as expert witness The European psychologist in forensic work and as expert witness Recommendations for an ethical practice 1. Introduction 1.1 These recommendations are made to the EFPPA member associations, advising that

More information

The Logical Framework Approach An Introduction 1

The Logical Framework Approach An Introduction 1 The Logical Framework Approach An Introduction 1 1. What is the Logical Framework Approach? 1.1. The background The Logical Framework Approach (LFA) was developed in the late 1960 s to assist the US Agency

More information

pm4dev, 2007 management for development series Introduction to Project Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS

pm4dev, 2007 management for development series Introduction to Project Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS pm4dev, 2007 management for development series Introduction to Project Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS A methodology to manage

More information

Improving Performance by Breaking Down Organizational Silos. Understanding Organizational Barriers

Improving Performance by Breaking Down Organizational Silos. Understanding Organizational Barriers Select Strategy www.selectstrategy.com 1 877 HR ASSET 1 877 472 7738 Improving Performance by Breaking Down Organizational Silos Understanding Organizational Barriers Restructuring initiatives have become

More information

Benefits Realization from IS & IT, and Change Management of roles and the working practices of individuals and teams.

Benefits Realization from IS & IT, and Change Management of roles and the working practices of individuals and teams. : Delivering Value from IS & IT Investments John Ward and Elizabeth Daniel John Wiley & Son Ltd ISBN: 9780470094631, 399 pages Theme of the Book This book explores a process and practical tools and frameworks

More information

THE BUSINESS OF THE DESIGN DOCTORATE A CRITICAL ANALYSIS OF AIMS, INTERACTIONS AND IMPACTS Martin Woolley, University of the Arts, London

THE BUSINESS OF THE DESIGN DOCTORATE A CRITICAL ANALYSIS OF AIMS, INTERACTIONS AND IMPACTS Martin Woolley, University of the Arts, London THE BUSINESS OF THE DESIGN DOCTORATE A CRITICAL ANALYSIS OF AIMS, INTERACTIONS AND IMPACTS Martin Woolley, University of the Arts, London This paper examines the aspirations of research students, whether

More information

ANALYSIS OF NEGOTIATION AND ARGUMENTATIVE SKILLS IN ONLINE COLLABORATIVE LEARNING FROM SOCIAL, COGNITIVE, AND CONSTRUCTIVIST PERSPECTIVES

ANALYSIS OF NEGOTIATION AND ARGUMENTATIVE SKILLS IN ONLINE COLLABORATIVE LEARNING FROM SOCIAL, COGNITIVE, AND CONSTRUCTIVIST PERSPECTIVES ANALYSIS OF NEGOTIATION AND ARGUMENTATIVE SKILLS IN ONLINE COLLABORATIVE LEARNING FROM SOCIAL, COGNITIVE, AND CONSTRUCTIVIST PERSPECTIVES Maria José de Miranda Nazaré Loureiro, Universidade de Aveiro,

More information

STAGE 1 COMPETENCY STANDARD FOR PROFESSIONAL ENGINEER

STAGE 1 COMPETENCY STANDARD FOR PROFESSIONAL ENGINEER STAGE 1 STANDARD FOR PROFESSIONAL ENGINEER ROLE DESCRIPTION - THE MATURE, PROFESSIONAL ENGINEER The following characterises the senior practice role that the mature, Professional Engineer may be expected

More information

Information Technology Research in Developing Nations: Major Research Methods and Publication Outlets

Information Technology Research in Developing Nations: Major Research Methods and Publication Outlets Information Technology Research in Developing Nations: Major Research Methods and Publication Outlets Franklin Wabwoba, Anselimo Peters Ikoha Masinde Muliro University of Science and Technology, Computer

More information

Partnership alliance for supply chain collaboration Rosalin Zeltser and Samir Gupta

Partnership alliance for supply chain collaboration Rosalin Zeltser and Samir Gupta Partnership alliance for supply chain collaboration Rosalin Zeltser and Samir Gupta Abstract It has been recognized, both from academic papers and from the marketplace itself that competition is no longer

More information

Consultation paper on proposals to enhance protection for the investing public

Consultation paper on proposals to enhance protection for the investing public Consultation paper on proposals to enhance protection for the investing public Part I Introduction Executive Summary Impact of financial crisis 1. In the past twelve months following the collapse of Lehman

More information

SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT

SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT Through CGIAR Financial Guideline No 3 Auditing Guidelines Manual the CGIAR has adopted the IIA Definition of internal auditing

More information

GLOSSARY OF EVALUATION TERMS

GLOSSARY OF EVALUATION TERMS Planning and Performance Management Unit Office of the Director of U.S. Foreign Assistance Final Version: March 25, 2009 INTRODUCTION This Glossary of Evaluation and Related Terms was jointly prepared

More information

UNIVERSITY OF BELGRADE FACULTY OF PHILOSOPHY. Part two: INFORMATION ON DEGREE PROGRAMS

UNIVERSITY OF BELGRADE FACULTY OF PHILOSOPHY. Part two: INFORMATION ON DEGREE PROGRAMS Part two: INFORMATION ON DEGREE PROGRAMS Part two: Information on Degree Programs Philosophy Bachelor s Degree Philosophy Master s Degree Philosophy Doctoral Degree Sociology Bachelor s Degree Sociology

More information

Study of the Importance and Applicability of the Factor "Mark-up in the Budgeting of Construction

Study of the Importance and Applicability of the Factor Mark-up in the Budgeting of Construction Study of the Importance and Applicability of the Factor "Mark-up in the Budgeting of Construction Abstract Forming the price of a service and the subsequent finding of the value of the proposal is based

More information

Public Administration Reform Process In Macedonia: Between Politics And Good Governance

Public Administration Reform Process In Macedonia: Between Politics And Good Governance Public Administration Reform Process In Macedonia: Between Politics And Good Governance Branko Dimeski Assistant Professor, Department of Administration and Management Information Systems, St. Kliment

More information

Note that the following document is copyright, details of which are provided on the next page.

Note that the following document is copyright, details of which are provided on the next page. Please note that the following document was created by the former Australian Council for Safety and Quality in Health Care. The former Council ceased its activities on 31 December 2005 and the Australian

More information

SIREN event report STRATEGIC INFORMATION RESPONSE NETWORK United Nations Inter-Agency Project on Human Trafficking (UNIAP): Phase III

SIREN event report STRATEGIC INFORMATION RESPONSE NETWORK United Nations Inter-Agency Project on Human Trafficking (UNIAP): Phase III SIREN event report STRATEGIC INFORMATION RESPONSE NETWORK United Nations Inter-Agency Project on Human Trafficking (UNIAP): Phase III BANGKOK, THAILAND 20 June 2011 GMS-09 THE STATE OF COUNTER-TRAFFICKING

More information

MODELING OF DOCUMENTS AND FLOWCHARTS FROM SERVICE QUALITY MANAGEMENT SYSTEM

MODELING OF DOCUMENTS AND FLOWCHARTS FROM SERVICE QUALITY MANAGEMENT SYSTEM U.P.B. Sci. Bull., Series D, Vol. 77, Iss. 3, 2015 ISSN 1454-2358 MODELING OF DOCUMENTS AND FLOWCHARTS FROM SERVICE QUALITY MANAGEMENT SYSTEM Livia-Veronica LAZĂR 1, Marian GHEORGHE 2 The design, implementation

More information

Review Protocol Agile Software Development

Review Protocol Agile Software Development Review Protocol Agile Software Development Tore Dybå 1. Background The concept of Agile Software Development has sparked a lot of interest in both industry and academia. Advocates of agile methods consider

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

FLOOD DAMAGES AND TOOLS FOR THEIR MITIGATION Lenka Camrova, Jirina Jilkova

FLOOD DAMAGES AND TOOLS FOR THEIR MITIGATION Lenka Camrova, Jirina Jilkova FLOOD DAMAGES AND TOOLS FOR THEIR MITIGATION Lenka Camrova, Jirina Jilkova University of Economics, Prague, 2006, pp. 418. ISBN: 80-86684-35-0 English Summary In 1997 and 2002 the Czech Republic was heavily

More information

UNIVERSITY-LEVEL ENTREPRENEURSHIP EDUCATION IN POLAND. Prof. Jerzy Cieslik, Leon Kozminski Academy of Entrepreneurship and Management, Warsaw, Poland

UNIVERSITY-LEVEL ENTREPRENEURSHIP EDUCATION IN POLAND. Prof. Jerzy Cieslik, Leon Kozminski Academy of Entrepreneurship and Management, Warsaw, Poland UNIVERSITY-LEVEL ENTREPRENEURSHIP EDUCATION IN POLAND Prof. Jerzy Cieslik, Leon Kozminski Academy of Entrepreneurship and Management, Warsaw, Poland ABSTRACT This paper outlines Polish experiences in fostering

More information

ISAE 3000 (Revised), Assurance Engagements Other Than Audits or Reviews of Historical Financial Information

ISAE 3000 (Revised), Assurance Engagements Other Than Audits or Reviews of Historical Financial Information International Auditing and Assurance Standards Board Exposure Draft April 2011 Comments requested by September 1, 2011 Proposed International Standard on Assurance Engagements (ISAE) ISAE 3000 (Revised),

More information

Instructional Technology Capstone Project Standards and Guidelines

Instructional Technology Capstone Project Standards and Guidelines Instructional Technology Capstone Project Standards and Guidelines The Committee recognizes the fact that each EdD program is likely to articulate some requirements that are unique. What follows are a

More information

[ cover page ] Title: Implementing Information Security Management Systems - An Empirical Study of Critical Success Factors

[ cover page ] Title: Implementing Information Security Management Systems - An Empirical Study of Critical Success Factors [ cover page ] Title: Implementing Information Security Management Systems - An Empirical Study of Critical Success Factors Author: Fredrik Björck Contact information: Department of Computer and Systems

More information

Standards for Excellence

Standards for Excellence THE AUSTRALIAN ASSOCIATION OF MATHEMATICS TEACHERS Standards for Excellence in Teaching Mathematics in Australian Schools 2006 edition These Standards were originally adopted by AAMT Council in 2002 as

More information

Critical Inquiry in Educational Research and Professional Practice

Critical Inquiry in Educational Research and Professional Practice DOCTOR IN EDUCATION COURSE DESCRIPTIONS A. CORE COURSES NEDD 800 Professionalism, Ethics, and the Self This introductory core course will explore and interrogate ideas surrounding professionalism and professionalization.

More information

Disaster Recovery Plan. NGO Emergency Operations

Disaster Recovery Plan. NGO Emergency Operations Disaster Recovery Plan NGO Emergency Operations When a disaster happens there is a natural tendency to optimize the capacity to respond quickly in order to find the best solutions to reduce the effect

More information

Social Work Program Outcomes

Social Work Program Outcomes 1 Social Work Program Outcomes 2009 2010 2 The 2008 Educational Policy and Accreditation Standards (EPAS) identified by the Council on Social Work Education (CSWE) include a provision for assessment of

More information

(Refer Slide Time: 01:52)

(Refer Slide Time: 01:52) Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This

More information

PERIODICAL EVALUATION AND FUNDING OF FCT R&D UNITS - Review Panels Stage 2 - Final Meeting Guidelines

PERIODICAL EVALUATION AND FUNDING OF FCT R&D UNITS - Review Panels Stage 2 - Final Meeting Guidelines PERIODICAL EVALUATION AND FUNDING OF FCT R&D UNITS - Review Panels Stage 2 - Final Meeting Guidelines 19/11/2014 1 CONTENTS Evaluation Structure - Panels... 3 Inputs... 3 Review Panel meetings (November

More information

IMEO International Mass Event Organization based on Recent Experience of Euro 2012

IMEO International Mass Event Organization based on Recent Experience of Euro 2012 IMEO International Mass Event Organization based on Recent Experience of Euro 2012 1. Name of the project: Project Management 2. Leader of the workshop (materials' author): Szymon Włochowicz 1 Objectives

More information

PERFORMANCE MEASUREMENT TOOLS IN BUSINESS PROCESS MANAGEMENT A CONTEMPORARY APPROACH

PERFORMANCE MEASUREMENT TOOLS IN BUSINESS PROCESS MANAGEMENT A CONTEMPORARY APPROACH PERFORMANCE MEASUREMENT TOOLS IN BUSINESS PROCESS MANAGEMENT A CONTEMPORARY APPROACH Associate Professor PhD. VERONICA ADRIANA POPESCU 1, Professor PhD. GHEORGHE N. POPESCU 2, Lecturer PhD. Cristina Raluca

More information

Doctor of Education - Higher Education

Doctor of Education - Higher Education 1 Doctor of Education - Higher Education The University of Liverpool s Doctor of Education - Higher Education (EdD) is a professional doctoral programme focused on the latest practice, research, and leadership

More information

Holistic Development of Knowledge Management with KMMM

Holistic Development of Knowledge Management with KMMM 1 Karsten Ehms, Dr. Manfred Langen Holistic Development of Knowledge Management with KMMM Siemens AG / Corporate Technology Knowledge Management & Business Transformation If knowledge management is to

More information

KNOWLEDGE FACTORING USING NORMALIZATION THEORY

KNOWLEDGE FACTORING USING NORMALIZATION THEORY KNOWLEDGE FACTORING USING NORMALIZATION THEORY J. VANTHIENEN M. SNOECK Katholieke Universiteit Leuven Department of Applied Economic Sciences Dekenstraat 2, 3000 Leuven (Belgium) tel. (+32) 16 28 58 09

More information

History and Purpose of the Standards for Educational and Psychological Testing

History and Purpose of the Standards for Educational and Psychological Testing California State Personnel Board Merit Selection Manual: Policy and Practices SUMMARY OF THE STANDARDS FOR EDUCATIONAL AND The following summary of the Standards for Educational and Psychological Testing

More information

www.beccaria.de BECCARIA-STANDARDS

www.beccaria.de BECCARIA-STANDARDS www.beccaria.de BECCARIA-STANDARDS for ensuring quality in crime prevention projects Draft: 10 November 2005 Council for Crime Prevention Of Lower Saxony Erich Marks/Dr. Anja Meyer/Dr. Ruth Linssen Am

More information

Sustaining the Benefits of Action Research in Decision Support Tools Development: Lessons from an Urban Water Utility in Africa

Sustaining the Benefits of Action Research in Decision Support Tools Development: Lessons from an Urban Water Utility in Africa Sustaining the Benefits of Action Research in Decision Support Tools Development: Lessons from an Urban Water Utility in Africa Frank Kizito * National Water and Sewerage Corporation Kampala, Uganda Extended

More information

Abstract number: 020-0564. Knowledge management between companies and local governance in industrial. clusters. Department of Production Engineering

Abstract number: 020-0564. Knowledge management between companies and local governance in industrial. clusters. Department of Production Engineering Abstract number: 020-0564 Knowledge management between companies and local governance in industrial clusters Rafael Henrique Palma Lima 1 and Luiz Cesar Ribeiro Carpinetti 2 Department of Production Engineering

More information

REPORTING ACCOUNTANTS WORK ON FINANCIAL REPORTING PROCEDURES. Financing Change initiative

REPORTING ACCOUNTANTS WORK ON FINANCIAL REPORTING PROCEDURES. Financing Change initiative REPORTING ACCOUNTANTS WORK ON FINANCIAL REPORTING PROCEDURES consultation PAPER Financing Change initiative inspiring CONFIdENCE icaew.com/financingchange ICAEW operates under a Royal Charter, working

More information

Consulting projects: What really matters

Consulting projects: What really matters Consulting projects: What really matters The factors that influence the success of management consulting projects Case 138: het 'Zwijsen future proof' project met de inzet van GEA Results PhD 2014, Bart

More information

SOUTHERN UNIVERSITY AND A&M COLLEGE BATON ROUGE, LOUISIANA

SOUTHERN UNIVERSITY AND A&M COLLEGE BATON ROUGE, LOUISIANA MASTER OF SCIENCE IN NURSING (MSN) COURSE DESCRIPTIONS 600. THEORETICAL FOUNDATIONS OF ADVANCED NURSING (Credit, 3 hours). A systematic examination of the concepts of nursing, human beings, health, and

More information

MODEL FOR IT GOVERNANCE ASSESSMENT IN BANKS BASED ON INTEGRATION OF CONTROL FUNCTIONS

MODEL FOR IT GOVERNANCE ASSESSMENT IN BANKS BASED ON INTEGRATION OF CONTROL FUNCTIONS MODEL FOR IT GOVERNANCE ASSESSMENT IN BANKS BASED ON INTEGRATION OF CONTROL FUNCTIONS Ivana Dvorski Lacković PBZ stambena štedionica d.d., Croatia ivana.dvorski-lackovic@pbz.hr Abstract: Nowadays banks

More information

THE IMPACT OF E-COMMERCE ON THE INTERNAL CONTROL AND ON AUDITING PRACTICES

THE IMPACT OF E-COMMERCE ON THE INTERNAL CONTROL AND ON AUDITING PRACTICES THE IMPACT OF E-COMMERCE ON THE INTERNAL CONTROL AND ON AUDITING PRACTICES Carlos Santos ISCA-UA/CEO-INESC Aveiro, Portugal carlos.santos@isca.ua.pt José Tribolet CEO-INESC Lisboa, Portugal jose.tribolet@.inesc.pt

More information

Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS

Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS MEHARI 2007 Overview Methods Commission Mehari is a trademark registered by the Clusif CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Semard, 75009 PARIS Tél.: +33 153 25 08 80 - Fax: +33

More information

G.F. Huon School of Psychology, University of New South Wales, Sydney, Australia

G.F. Huon School of Psychology, University of New South Wales, Sydney, Australia INTERVIEWING AND OBSERVATION G.F. Huon School of Psychology, University of New South Wales, Sydney, Australia Keywords: Unobtrusive observation, systematic observation, ethical considerations, reactivity,

More information

What is Reflective Practice? Joy Amulya Senior Associate Community Science

What is Reflective Practice? Joy Amulya Senior Associate Community Science What is Reflective Practice? Joy Amulya Senior Associate Community Science Community Science 0 May 2011 What is Reflective Practice? Joy Amulya Senior Associate, Community Science Reflection: the foundation

More information

An Oracle White Paper June 2009. The Benefits of Risk Assessment for Projects, Portfolios, and Businesses

An Oracle White Paper June 2009. The Benefits of Risk Assessment for Projects, Portfolios, and Businesses An Oracle White Paper June 2009 The Benefits of Risk Assessment for Projects, Portfolios, and Businesses Executive Overview... 1 Introduction... 1 Why Do Projects Fail?... 3 The Effects of Optimism and

More information

Security metrics to improve information security management

Security metrics to improve information security management Security metrics to improve information security management Igli TASHI, Solange GHERNAOUTIHÉLIE HEC Business School University of Lausanne Switzerland Abstract The concept of security metrics is a very

More information

BS, MS, DNP and PhD in Nursing Competencies

BS, MS, DNP and PhD in Nursing Competencies BS, MS, DNP and PhD in Nursing Competencies The competencies arise from the understanding of nursing as a theory-guided, evidenced -based discipline. Graduates from the curriculum are expected to possess

More information

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access

More information

Epistemic artifacts The potential of artifacts in design research Flemming Tvede Hansen The Danish Design School, Denmark http://www.flemmingtvede.

Epistemic artifacts The potential of artifacts in design research Flemming Tvede Hansen The Danish Design School, Denmark http://www.flemmingtvede. Epistemic artifacts The potential of artifacts in design research Flemming Tvede Hansen The Danish Design School, Denmark http://www.flemmingtvede.dk fth@dkds.dk Abstract. An epistemic artifact is characterised

More information

Process of Strategic Marketing Decision Making in Small Business. Graham Jocumsen and Michael Gardiner, University of Southern Queensland.

Process of Strategic Marketing Decision Making in Small Business. Graham Jocumsen and Michael Gardiner, University of Southern Queensland. Process of Strategic Marketing Decision Making in Small Business Graham Jocumsen and Michael Gardiner, University of Southern Queensland Abstract The current inadequate level of understanding of how small

More information

How to Write a Successful PhD Dissertation Proposal

How to Write a Successful PhD Dissertation Proposal How to Write a Successful PhD Dissertation Proposal Before considering the "how", we should probably spend a few minutes on the "why." The obvious things certainly apply; i.e.: 1. to develop a roadmap

More information

Methods in writing process research

Methods in writing process research Carmen Heine, Dagmar Knorr and Jan Engberg Methods in writing process research Introduction and overview 1 Introduction Research methods are at the core of assumptions, hypotheses, research questions,

More information

How did Deutsche Bank shift from a regional to a

How did Deutsche Bank shift from a regional to a Doctor of Business Administration How did Deutsche Bank shift from a regional to a global operational structure? How does Siemens maximise the entrepreneurial spirit of its leaders towards identifying

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Council on Social Work Education Educational Policies and Standards (EPAS) Competencies, Practice Behaviors and Advanced Practice Behaviors

Council on Social Work Education Educational Policies and Standards (EPAS) Competencies, Practice Behaviors and Advanced Practice Behaviors Council on Social Work Education Educational Policies and Standards (EPAS) Competencies, Practice Behaviors and Advanced Practice Behaviors 2.1.1 Core Competency: Identify with social work profession a.

More information

A Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management

A Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management International Journal of Soft Computing and Engineering (IJSCE) A Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management Jayanthi.R, M Lilly Florence Abstract:

More information

Advisory Guidelines of the Financial Supervisory Authority. Requirements regarding the arrangement of operational risk management

Advisory Guidelines of the Financial Supervisory Authority. Requirements regarding the arrangement of operational risk management Advisory Guidelines of the Financial Supervisory Authority Requirements regarding the arrangement of operational risk management These Advisory Guidelines have established by resolution no. 63 of the Management

More information

PRACTICAL DIRECTIVES RELATIVE TO THE APPLICATION OF THE CODE OF ETHICS

PRACTICAL DIRECTIVES RELATIVE TO THE APPLICATION OF THE CODE OF ETHICS PRACTICAL DIRECTIVES RELATIVE TO THE APPLICATION OF THE CODE OF ETHICS Unofficial translation Only the official texts in the Dutch or French language are authentic. Contents PART I. Explanation of basic

More information

School of Social Work

School of Social Work Social Work 282 School of Social Work St. Patrick s Building 469 Telephone: 788-5601 Fax: 788-7496 The School Director of the School: Gillian Walker Supervisor of Graduate Studies: Allan Moscovitch The

More information

Policy Paper on Non-Formal Education: A framework for indicating and assuring quality

Policy Paper on Non-Formal Education: A framework for indicating and assuring quality Policy Paper on Non-Formal Education: A framework for indicating and assuring quality Adopted by the Council of Members/ Extraordinary General Assembly 2-3 May 2008 (Castelldefels, Catalonia - Spain) 0.

More information

Master s Programme in International Administration and Global Governance

Master s Programme in International Administration and Global Governance Programme syllabus for the Master s Programme in International Administration and Global Governance 120 higher education credits Second Cycle Confirmed by the Faculty Board of Social Sciences 2015-05-11

More information

*Heinemann, London, 1979

*Heinemann, London, 1979 Burrell and Morgan s Sociological Paradigms and Organizational Analysis * *Heinemann, London, 1979 Main 4 debates in Sociology Is reality given or is it a product of the mind? Must one experience something

More information

Soft Skills Requirements in Software Architecture s Job: An Exploratory Study

Soft Skills Requirements in Software Architecture s Job: An Exploratory Study Soft Skills Requirements in Software Architecture s Job: An Exploratory Study 1 Faheem Ahmed, 1 Piers Campbell, 1 Azam Beg, 2 Luiz Fernando Capretz 1 Faculty of Information Technology, United Arab Emirates

More information

Assessment. Show US The Learning. An Institution-Wide Process to Improve and Support Student Learning. College of DuPage

Assessment. Show US The Learning. An Institution-Wide Process to Improve and Support Student Learning. College of DuPage Student or participant learning or satisfaction Outcomes of the processes Reporting and feedback from the assessment measures Show US The Learning Delivery processes Planning processes An Institution-Wide

More information

School of Advanced Studies Doctor Of Health Administration. DHA 003 Requirements

School of Advanced Studies Doctor Of Health Administration. DHA 003 Requirements School of Advanced Studies Doctor Of Health Administration The mission of the Doctor of Health Administration degree program is to develop healthcare leaders by educating them in the areas of active inquiry,

More information

Methodological Issues for Interdisciplinary Research

Methodological Issues for Interdisciplinary Research J. T. M. Miller, Department of Philosophy, University of Durham 1 Methodological Issues for Interdisciplinary Research Much of the apparent difficulty of interdisciplinary research stems from the nature

More information

Chapter 2 Conceptualizing Scientific Inquiry

Chapter 2 Conceptualizing Scientific Inquiry Chapter 2 Conceptualizing Scientific Inquiry 2.1 Introduction In order to develop a strategy for the assessment of scientific inquiry in a laboratory setting, a theoretical construct of the components

More information

Development of Environmental Indicators for Monitoring of Genetically Modified Plants

Development of Environmental Indicators for Monitoring of Genetically Modified Plants Texte 28/02 ENVIRONMENTAL RESEARCH OF THE FEDERAL MINISTRY OF THE ENVIRONMENT, NATURE CONSERVATION AND NUCLEAR SAFETY Research Report 299 89 405 UBA-FB 000219/e Development of Environmental Indicators

More information

Software Engineering from an Engineering Perspective: SWEBOK as a Study Object

Software Engineering from an Engineering Perspective: SWEBOK as a Study Object Software Engineering from an Engineering Perspective: SWEBOK as a Study Object Alain Abran a,b, Kenza Meridji b, Javier Dolado a a Universidad del País Vasco/Euskal Herriko Unibertsitatea b Ecole de technologie

More information

Implementation of a Quality Management System for Aeronautical Information Services -1-

Implementation of a Quality Management System for Aeronautical Information Services -1- Implementation of a Quality Management System for Aeronautical Information Services -1- Implementation of a Quality Management System for Aeronautical Information Services Chapter IV, Quality Management

More information

School of Advanced Studies Doctor Of Education In Educational Leadership With A Specialization In Educational Technology. EDD/ET 003 Requirements

School of Advanced Studies Doctor Of Education In Educational Leadership With A Specialization In Educational Technology. EDD/ET 003 Requirements School of Advanced Studies Doctor Of Education In Educational Leadership With A Specialization In Educational Technology The mission of the Doctor of Education in Educational Leadership degree program

More information

A national framework for the development of decision-making tools for nursing and midwifery practice

A national framework for the development of decision-making tools for nursing and midwifery practice A national framework for the development of decision-making tools for nursing and midwifery practice Introduction The Nursing and Midwifery Board of Australia The Nursing and Midwifery Board of Australia

More information

Research Paradigms, the Philosophical Trinity, and Methodology

Research Paradigms, the Philosophical Trinity, and Methodology Research Paradigms, the Philosophical Trinity, and Methodology by Graham Durant-Law BSc, MHA, MKM, Grad Dip Def, Grad Dip Mngt, Grad Cert Hlth Fin, psc. Copyright Graham Durant-Law Presentation Objectives

More information

The Master s Degree Programme in. Digital Design

The Master s Degree Programme in. Digital Design Academic regulations for The Master s Degree Programme in Digital Design THE FACULTY OF HUMANITIES THE UNIVERSITY OF AARHUS 2008 1. Framework Conditions Title Prepared by Digital design Master s Degree

More information

THE INFORMATION TECHNOLOGY PROJECT CHARTER

THE INFORMATION TECHNOLOGY PROJECT CHARTER 1-01-12 INFORMATION MANAGEMENT: STRATEGY, SYSTEMS, AND TECHNOLOGIES THE INFORMATION TECHNOLOGY PROJECT CHARTER John P. Murray INSIDE Gaining Project Charter Approval; Project Charter Components; Project

More information

EVALUATION GUIDELINES

EVALUATION GUIDELINES EVALUATION GUIDELINES Introduction This document outlines the reviewing process and defines the responsibilities of the participants in the process. It details a number of important issues, such as: FCT

More information

By Jack Phillips and Patti Phillips How to measure the return on your HR investment

By Jack Phillips and Patti Phillips How to measure the return on your HR investment By Jack Phillips and Patti Phillips How to measure the return on your HR investment Using ROI to demonstrate your business impact The demand for HR s accountability through measurement continues to increase.

More information